General
-
Target
6e58348774321603f60fe0a6c9d2036c231ea67ca42ec8b8e2eff3175cea1323
-
Size
4.3MB
-
Sample
220320-ecw92sgebk
-
MD5
1111538ef73e921248d56f181c4fbdbf
-
SHA1
a9923340f8f24a8efde9ec0b7ca8d57de2bd2245
-
SHA256
6e58348774321603f60fe0a6c9d2036c231ea67ca42ec8b8e2eff3175cea1323
-
SHA512
00426648bebed8fab7f511d1ec2e5266cf0645c040274654ae396ffdefd94de48c44609f2d312159447ed8ba7a3cfab69ba3210f8716e0edd1170d4e203d7a67
Static task
static1
Behavioral task
behavioral1
Sample
6e58348774321603f60fe0a6c9d2036c231ea67ca42ec8b8e2eff3175cea1323.exe
Resource
win7-20220310-en
Malware Config
Extracted
danabot
1732
3
23.226.132.92:443
176.123.6.168:443
108.62.141.152:443
192.241.101.68:443
-
embedded_hash
DE420A65BFC5F29167A85A5199065A0E
-
type
main
Targets
-
-
Target
6e58348774321603f60fe0a6c9d2036c231ea67ca42ec8b8e2eff3175cea1323
-
Size
4.3MB
-
MD5
1111538ef73e921248d56f181c4fbdbf
-
SHA1
a9923340f8f24a8efde9ec0b7ca8d57de2bd2245
-
SHA256
6e58348774321603f60fe0a6c9d2036c231ea67ca42ec8b8e2eff3175cea1323
-
SHA512
00426648bebed8fab7f511d1ec2e5266cf0645c040274654ae396ffdefd94de48c44609f2d312159447ed8ba7a3cfab69ba3210f8716e0edd1170d4e203d7a67
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-